Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?
A. TCP port 443
B. UDP port 161
C. TCP port 110
D. UDP port 1701
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
A. A firewall is blocking him.
B. His laptop is incompatible.
C. MAC filtering is blocking him.
D. His operating system is incompatible.
Which of the following services resolves host name to IP Address?
A. Computer Browser
B. DHCP
C. DNS
D. WINS
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer, which is sometimes called the Network Access or Link Layer?
A. Provides end-to-end data delivery service for user applications
B. Handles the routing of the data packets over the network
C. Manages IP addressing and encryption for data packets
D. Defines the procedures for interfacing with Ethernet devices
An employee is currently logged into the corporate web server, without permission. You log into the web server as 'admin" and look for the employee's username: "dmaul" using the "who" command. This is what you get back:
A. The contents of the /var/log/messages file has been altered
B. The contents of the bash history file has been altered
C. The contents of the utmp file has been altered
D. The contents of the http logs have been altered
What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?
A. Risk of system crashes and security alerts.
B. Risk of deletion of backup files.
C. Risk of modified application configuration files.
D. Risk of applying untested patches.
Use PowerShell ISE to
examineC:\Windows\security\templates\WorkstationSecureTemplate.inf. Which setting is configured in the template?
A. ResetLockoutCount
B. NewAdministratorName
C. MinirnumPasswordAge
D. Require logonToChangoPassword
E. SeRemotPlnteractiveLogonRlght
F. MaxRenewAge
G. AuditSystemEvents
H. EnableGuestAccount
I. AuditPolicyChange
Which of the following statements about Microsoft's VPN client software is FALSE?
A. The VPN interface can be figured into the route table.
B. The VPN interface has the same IP address as the interface to the network it's been specified to protect.
C. The VPN client software is built into the Windows operating system.
D. The VPN tunnel appears as simply another adapter.
What is the key difference between Electronic Codebook mode and other block cipher modes like Cipher Block Chaining, Cipher-Feedback and Output-Feedback?
A. Plaintext patterns are concealed by XO Ring with previous cipher text block but input to the block cipher is not randomized.
B. Plaintext patterns are concealed and input to the block cipher is randomized by XO Ring with previous cipher text block.
C. Plaintext patterns encrypted with the same key will always generate the same Cipher text pattern
D. Plaintext patterns are not concealed but input to the block cipher is randomized by XO Ring with previous cipher text block.
Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.
This style of defense-in-depth protection is best described as which of the following?
A. Uniform protection
B. Threat-oriented
C. Information-centric
D. Protected enclaves